Search results for 'use http-tunneling technology'.
4107 products found. Showing 234-246 in 10 groups sorted by relevance.
234. Instant Demo Professional
Create Demos and Flash Presentations Effortlessly Instant Demo is an easy-to-use Windows application for making demos, presentations, and training tools for software applications. Instant Demo uses innovative technology to produce animated Flash movies that require only 0.1MB of disk space per minute of animation. DetailsDownload trialBuy now ($399.00) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Vendor: NetPlay Software
Smart Scan Technology: By Multi-Optimized Readtime Scan engine, to get the Max-Speed of the Realtime Scan. Twister Anti-TrojanVirus is a powerful, advanced, ingenious, easy-to-use Trojan, Virus and Harmful-Program scanner and remover.
236. #Amazing Desktop
To turn off you computer when it's no longer in use. To use an Address Book for contact information or a To Do List for important activities. Amazing Desktop lets you use tabs and panels to manage running applications on your Desktop. DetailsDownload trialBuy now ($19.99) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: SoftApproach Corp.
And with the up to date Skin and Bones technology even character animation is available with CyberMotion. There is a choice of several rendering algorithms, from simple scanline (depth buffer) to up-to-date global illumination rendering methods using raytracing and photon mapping.
238. SMS Gateway by GPA Technology - Windows Edition
This utility may be used for ad-hoc messaging alongside a corporate messaging or database access application. It facilitates complete two way messaging capabilities over GSM networks for Windows 95/98/NT/2000/XP based applications through the use of DDE, OLE Automation, SMTP, POP3, HTTP, XML, and the Command Line Interface (CLI). DetailsDownload trial (Full version: 5.2 MB) Buy now ($165.00) Find similar
Platform: Windows 3.1x, Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98
Vendor: GPA Technology Pty. Ltd.
Easy-to-use interface. List of authorized and prohibited applications While scanning and analyzing applications activity, Safe'n'Sec uses lists of authorized and prohibited applications. Easy-to-use user interface. Using the history records, it is possible to pin-point sources of new threats and vulnerabilities.
241. SoftWriting 4.1 for Innowrite Users Use most scanners, tablets and digital pens: In order to scan the handwritten document, any scanner can be used, as long as the scanner is TWAIN-compatible, and that it can create gray or color images. Use abbreviations: SoftWriting enables users to' teach' the system abbreviations, which are automatically translated by the system. DetailsDownload trialBuy now ($49.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: CharacTell Ltd
Easy-to-use interface. List of authorized and prohibited applications While scanning and analyzing applications activity, Safe'n'Sec uses lists of authorized and prohibited applications. Easy-to-use user interface. Using the history records, it is possible to pin-point sources of new threats and vulnerabilities.
245. SoftWriting 4.1 (DOWNLOAD) Use most scanners, tablets and digital pens: In order to scan the handwritten document, any scanner can be used, as long as the scanner is TWAIN-compatible, and that it can create gray or color images. Use abbreviations: SoftWriting enables users to' teach' the system abbreviations, which are automatically translated by the system. DetailsDownload trialBuy now ($59.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: CharacTell Ltd
Easy-to-use interface. List of authorized and prohibited applications While scanning and analyzing applications activity, Safe'n'Sec uses lists of authorized and prohibited applications. Easy-to-use user interface. Using the history records, it is possible to pin-point sources of new threats and vulnerabilities.